SlideShare una empresa de Scribd logo
1 de 25
Biometric
steganography



By –
Manoj Kumar Mohanty
Department of Computer
Science and Engineering
NIT Rourkela
2          19/3/2012




Outline
 Introduction

 Application    Scenarios
 LSB   Insertion method
 Amplitude   modulation-based hiding
 Conclusion
3                 19/3/2012




Introduction
 Biometrics data provides uniqueness but
  do not provide secrecy.
 For wide spread utilization of biometric
  techniques, security of biometric data is
  essential.
4                   19/3/2012




Biometric data security
                             Steganography

Cryptography

               BIOMETRICS
                  DATA




                       Watermarking
5                 19/3/2012




Application Scenario
 Biometric data, such as fingerprint
  minutiae is hidden in a cover image and is
  transmitted.
 The function of the host or cover image is
  only to carry the data and it need not be
  related to the data in any way.
6               19/3/2012




Cover Images




Synthetic     Face    Arbitrary
Fingerprint   image   image
image
7        19/3/2012




Synthetic Fingerprint
8                    19/3/2012




                   Cover
                   Image


Minutiae         Watermark             Secret
 Data             Encoder               Key


                Stego Image

                        Communication Channel

                 Watermark             Secret
                  Decoder               Key


           Extracted Minutiae Data

  Steganography-based minutiae hiding
9                   19/3/2012




LSB Insertion Method
 Take  the binary representation of the
  biometric data and replace it over the
  least significant bit(LSB) of each byte
  within the cover image.
 In 24 bit color image, the amount of
  change will be minimal and difficult to
  detect.
10                19/3/2012




LSB Insertion cont.
 Consider  three adjacent pixels (9 bytes)
 with the RGB encoding as follows
  11110101 11001101 10101001
  10100110 11001111 11001010
  10101111 00010011 11001000
 Suppose the data to be hidden in binary
 is (101101101).
11            19/3/2012




LSB Insertion Cont.
      11110101 11001100 10101001
      10100111 11001110 11001011
      10101111 00010011 11001000

 9 bits successfully hidden by only
changing 4 bits.
12                 19/3/2012




LSB Insertion Method:
Advantages
 If message bit is same as the pixel’s least
  significant bit then no change is required
  for that pixel value.
 If pixel value is different from message bit
  then effective change in pixel value is still
  invisible to human eye.
13                19/3/2012




LSB Insertion Method:
Disadvantages
 Message    can be easily removed by an
  intruder as message is in the least
  significant bit.
 Further intruder can modify the least
  significant bit of all the image pixels.
 The least significant bit may get corrupted

  by hardware imperfections or noise.
14                19/3/2012




Amplitude-modulation based
hiding technique
 Convert   the minutiae data into a bit
  stream.
 Every field of individual minutiae is
  converted to a 9-bit binary
  representation.
 A random number generator initialized
  with the secret key generates locations of
  the host image pixels to be watermarked.
15   19/3/2012
16   19/3/2012
17   19/3/2012
18               19/3/2012




 Every watermark bit with the value s is
  embedded in multiple locations to ensure
  better decoding rate of the embedded
  information.
 Along with the binary minutiae data, two
  reference bits, 0 and 1 are also
  embedded to the image.
 These help in calculating an adaptive
  threshold in determining the minutiae bit
  values during decoding.
19   19/3/2012




Decoding
20   19/3/2012
21   19/3/2012
22                19/3/2012




 From  decoded watermark bits, the
  minutiae data hidden in the host image is
  extracted.
 This data hiding model is robust and can
  handle attacks such as image cropping,
  and JPEG compression.
23                   19/3/2012




Conclusion
   The ability of biometrics-based personal
    identification techniques to efficiently
    differentiate between an authorized person and
    an impostor is one of the main reasons for their
    popularity in contrast to the traditional security
    techniques.
   However, the security and integrity of the
    biometric data itself are important issues.
    Application of steganography is a possible
    techniques to secure biometric data. Currently
    research is going on to increase the data hiding
    capacity of the host images and methods for
    combining watermarking schemes to achieve
    better result.
24                            19/3/2012




References
[1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, in
Proc. AutoID02, NY, March 2002

[2] Chander Kant, Rajender Nath, Sheetal Chaudhary:
“Biometrics Security using Steganography”, in CSC online Journal
“International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008.

[3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical Access
Control Enhanced by Use of Steganography Over Secured
Transmission Channel", in IEEE International Conference on Intelligent
Data Acquisition and Advanced Computing Systems: Technology and
Applications, September 2011.

[4] http://biolab.csr.unibo.it/
   Biometric System Laboratory, University of Bologna, Italy
25   19/3/2012

Más contenido relacionado

La actualidad más candente

Autenticacion
AutenticacionAutenticacion
Autenticacion
hmitre17
 
Digital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdf
Digital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdfDigital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdf
Digital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdf
ssuserbe3944
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)
Peter R. Egli
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 

La actualidad más candente (20)

Hardware trojan detection technique using side channel analysis for hardware ...
Hardware trojan detection technique using side channel analysis for hardware ...Hardware trojan detection technique using side channel analysis for hardware ...
Hardware trojan detection technique using side channel analysis for hardware ...
 
Autenticacion
AutenticacionAutenticacion
Autenticacion
 
NVR
NVRNVR
NVR
 
Edge Computing
Edge Computing Edge Computing
Edge Computing
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
IP-VPN
IP-VPNIP-VPN
IP-VPN
 
Digital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdf
Digital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdfDigital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdf
Digital Image Processing 3rd edition Rafael C. Gonzalez, Richard E. Woods.pdf
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)
 
GRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D GraphicsGRPHICS01 - Introduction to 3D Graphics
GRPHICS01 - Introduction to 3D Graphics
 
Steganography
SteganographySteganography
Steganography
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Architectural reference model
Architectural reference modelArchitectural reference model
Architectural reference model
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 

Destacado

Startup Launch Pad 2011
Startup Launch Pad 2011 Startup Launch Pad 2011
Startup Launch Pad 2011
kommaraj
 
Brochure_Application Outsourcing
Brochure_Application OutsourcingBrochure_Application Outsourcing
Brochure_Application Outsourcing
Stefan Forssman
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
Piyush Mittal
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 

Destacado (19)

NNIT
NNITNNIT
NNIT
 
Startup Launch Pad 2011
Startup Launch Pad 2011 Startup Launch Pad 2011
Startup Launch Pad 2011
 
Brochure_Application Outsourcing
Brochure_Application OutsourcingBrochure_Application Outsourcing
Brochure_Application Outsourcing
 
Copenhagen Capacity 'Invitation'
Copenhagen Capacity 'Invitation'Copenhagen Capacity 'Invitation'
Copenhagen Capacity 'Invitation'
 
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
Designing an Efficient Multimodal Biometric System using Palmprint and Speech...
 
Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combine
 
Biometric
BiometricBiometric
Biometric
 
Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris Multimodal fusion of fingerprint and iris
Multimodal fusion of fingerprint and iris
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Paper multi-modal biometric system using fingerprint , face and speech
Paper   multi-modal biometric system using fingerprint , face and speechPaper   multi-modal biometric system using fingerprint , face and speech
Paper multi-modal biometric system using fingerprint , face and speech
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
rm ppt 2
rm ppt 2rm ppt 2
rm ppt 2
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a Biometric steganography

Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 

Similar a Biometric steganography (20)

ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
It3116411644
It3116411644It3116411644
It3116411644
 
Lsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale ImageLsb Based Digital Image Watermarking For Gray Scale Image
Lsb Based Digital Image Watermarking For Gray Scale Image
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
C010511420
C010511420C010511420
C010511420
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
INFORMATION SECURITY THROUGH IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT A...
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
167 171
167 171167 171
167 171
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...Digital watermarking by utilizing the properties of selforganization map bas...
Digital watermarking by utilizing the properties of selforganization map bas...
 
P017329498
P017329498P017329498
P017329498
 

Más de Piyush Mittal (20)

Power mock
Power mockPower mock
Power mock
 
Design pattern tutorial
Design pattern tutorialDesign pattern tutorial
Design pattern tutorial
 
Reflection
ReflectionReflection
Reflection
 
Gpu archi
Gpu archiGpu archi
Gpu archi
 
Cuda Architecture
Cuda ArchitectureCuda Architecture
Cuda Architecture
 
Intel open mp
Intel open mpIntel open mp
Intel open mp
 
Intro to parallel computing
Intro to parallel computingIntro to parallel computing
Intro to parallel computing
 
Cuda toolkit reference manual
Cuda toolkit reference manualCuda toolkit reference manual
Cuda toolkit reference manual
 
Matrix multiplication using CUDA
Matrix multiplication using CUDAMatrix multiplication using CUDA
Matrix multiplication using CUDA
 
Channel coding
Channel codingChannel coding
Channel coding
 
Basics of Coding Theory
Basics of Coding TheoryBasics of Coding Theory
Basics of Coding Theory
 
Java cheat sheet
Java cheat sheetJava cheat sheet
Java cheat sheet
 
Google app engine cheat sheet
Google app engine cheat sheetGoogle app engine cheat sheet
Google app engine cheat sheet
 
Git cheat sheet
Git cheat sheetGit cheat sheet
Git cheat sheet
 
Vi cheat sheet
Vi cheat sheetVi cheat sheet
Vi cheat sheet
 
Css cheat sheet
Css cheat sheetCss cheat sheet
Css cheat sheet
 
Cpp cheat sheet
Cpp cheat sheetCpp cheat sheet
Cpp cheat sheet
 
Ubuntu cheat sheet
Ubuntu cheat sheetUbuntu cheat sheet
Ubuntu cheat sheet
 
Php cheat sheet
Php cheat sheetPhp cheat sheet
Php cheat sheet
 
oracle 9i cheat sheet
oracle 9i cheat sheetoracle 9i cheat sheet
oracle 9i cheat sheet
 

Último

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Último (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

Biometric steganography

  • 1. Biometric steganography By – Manoj Kumar Mohanty Department of Computer Science and Engineering NIT Rourkela
  • 2. 2 19/3/2012 Outline  Introduction  Application Scenarios  LSB Insertion method  Amplitude modulation-based hiding  Conclusion
  • 3. 3 19/3/2012 Introduction  Biometrics data provides uniqueness but do not provide secrecy.  For wide spread utilization of biometric techniques, security of biometric data is essential.
  • 4. 4 19/3/2012 Biometric data security Steganography Cryptography BIOMETRICS DATA Watermarking
  • 5. 5 19/3/2012 Application Scenario  Biometric data, such as fingerprint minutiae is hidden in a cover image and is transmitted.  The function of the host or cover image is only to carry the data and it need not be related to the data in any way.
  • 6. 6 19/3/2012 Cover Images Synthetic Face Arbitrary Fingerprint image image image
  • 7. 7 19/3/2012 Synthetic Fingerprint
  • 8. 8 19/3/2012 Cover Image Minutiae Watermark Secret Data Encoder Key Stego Image Communication Channel Watermark Secret Decoder Key Extracted Minutiae Data Steganography-based minutiae hiding
  • 9. 9 19/3/2012 LSB Insertion Method  Take the binary representation of the biometric data and replace it over the least significant bit(LSB) of each byte within the cover image.  In 24 bit color image, the amount of change will be minimal and difficult to detect.
  • 10. 10 19/3/2012 LSB Insertion cont.  Consider three adjacent pixels (9 bytes) with the RGB encoding as follows 11110101 11001101 10101001 10100110 11001111 11001010 10101111 00010011 11001000  Suppose the data to be hidden in binary is (101101101).
  • 11. 11 19/3/2012 LSB Insertion Cont. 11110101 11001100 10101001 10100111 11001110 11001011 10101111 00010011 11001000  9 bits successfully hidden by only changing 4 bits.
  • 12. 12 19/3/2012 LSB Insertion Method: Advantages  If message bit is same as the pixel’s least significant bit then no change is required for that pixel value.  If pixel value is different from message bit then effective change in pixel value is still invisible to human eye.
  • 13. 13 19/3/2012 LSB Insertion Method: Disadvantages  Message can be easily removed by an intruder as message is in the least significant bit.  Further intruder can modify the least significant bit of all the image pixels.  The least significant bit may get corrupted by hardware imperfections or noise.
  • 14. 14 19/3/2012 Amplitude-modulation based hiding technique  Convert the minutiae data into a bit stream.  Every field of individual minutiae is converted to a 9-bit binary representation.  A random number generator initialized with the secret key generates locations of the host image pixels to be watermarked.
  • 15. 15 19/3/2012
  • 16. 16 19/3/2012
  • 17. 17 19/3/2012
  • 18. 18 19/3/2012  Every watermark bit with the value s is embedded in multiple locations to ensure better decoding rate of the embedded information.  Along with the binary minutiae data, two reference bits, 0 and 1 are also embedded to the image.  These help in calculating an adaptive threshold in determining the minutiae bit values during decoding.
  • 19. 19 19/3/2012 Decoding
  • 20. 20 19/3/2012
  • 21. 21 19/3/2012
  • 22. 22 19/3/2012  From decoded watermark bits, the minutiae data hidden in the host image is extracted.  This data hiding model is robust and can handle attacks such as image cropping, and JPEG compression.
  • 23. 23 19/3/2012 Conclusion  The ability of biometrics-based personal identification techniques to efficiently differentiate between an authorized person and an impostor is one of the main reasons for their popularity in contrast to the traditional security techniques.  However, the security and integrity of the biometric data itself are important issues. Application of steganography is a possible techniques to secure biometric data. Currently research is going on to increase the data hiding capacity of the host images and methods for combining watermarking schemes to achieve better result.
  • 24. 24 19/3/2012 References [1] A.K. Jain, U. Uludag: “Hiding Fingerprint Minutiae into Images.”, in Proc. AutoID02, NY, March 2002 [2] Chander Kant, Rajender Nath, Sheetal Chaudhary: “Biometrics Security using Steganography”, in CSC online Journal “International Journal of Security” Malashiya vol. 2 Issue-1,PP 1-5. 2008. [3] Adrian Kapczynski, Arkadiusz Banasik: "Biometric Logical Access Control Enhanced by Use of Steganography Over Secured Transmission Channel", in IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, September 2011. [4] http://biolab.csr.unibo.it/ Biometric System Laboratory, University of Bologna, Italy
  • 25. 25 19/3/2012